Ransomware is the new hot threat everyone is talking about; what do you need to know?

Image Credit: Shutterstock/Wk1003mikeYou wake up one day, rub the sleep out of your eyes, and boot up your laptop. Expecting to see a Twitter feed or Facebook profile, instead you’re greeted with a big red image, demanding that if you don’t pay $200 to an unknown party in the next 24-hours, everything you know and love on your computer will be erased, and gone forever.

Welcome to the world of “ransomware,” the newest, hottest way that underground criminals are pulling cash from the pockets of innocent victims and using it to fund their clandestine operations. But what exactly is this ransomware stuff, and is there anything you can do to protect yourself against it?

A brief history of ransomeware

As antivirus vendors and security professionals continue to make headway against global malware campaigns on a daily basis, hackers have been looking for more inventive ways of keeping their revenue streams strong without relying on standard credit card fraud techniques.

The result of this effort has come in the form of new viruses like Cryptolocker, Cryptowall, and more recently, TeslaCrypt, which are all members of an increasingly popular family of infections known as “ransomware.” The earliest known version of ransomware, called CryptoLocker, first debuted on the scene around the tail end of 2013, and hit so hard the Internet barely had enough time to figure out what it was dealing with in the first place.

In what seemed like no more than a week, a flood of users were reporting that a new, unknown style of virus had locked down their hard drives, and was demanding a healthy ransom to return control of their most prized files and folders. By capitalizing on the relatively unknown nature of its infection style, ransomware was able to sweep through tens of thousands of computers in a matter of days, spreading through established botnets and infecting users via standard phishing links embedded in email attachments and untrustworthy downloads.

Despite trying system resets, flashing the BIOS, or installing new hard drives altogether, the only screen they would be able to see was the hacker’s flyer which told them how much they needed to pay to regain access, and how long they had left before the format bomb would eventually go off.

Worse, users started reporting that the hackers were making good on their word, and would remove CryptoLocker if the terms had been met in the allotted 24-hour period. This only encouraged more desperate and confused victims to pay the fee instead of looking for an alternative option, which in turn, fueled the spread among criminal organizations who spied a new, quick way to make an easy buck.

Unlike classical malware that installs keyloggers, backdoors, or trojans on a computer in the hopes that a user would eventually type in the details of a credit card or other personal information that could later be used or sold, CryptoLocker and its many subsequent variants offered a simple, and reliable revenue stream that the underground market could capitalize on to fund other, less-profitable operations.

Amounts demanded for the ransom would vary wildly depending on the criminal ring behind it, anywhere from $25 to $600, almost always paid either in Bitcoin, or sent through MoneyGram onto untraceable prepaid cards in Eastern European nations.

The threat goes mobile

Not soon after PCs were experiencing a torrent of total lockdowns, both mobile security firms and mobile phone owners were reporting that the threat had migrated onto select pieces of hardware running Google’s Android operating system, and even a few devices in the iOS ecosystem we subjected to similar attacks.

Mobile ransomware would work much the same as its bigger cousin, locking down a device entirely, with only a message being displayed that demanded an exorbitant sum be paid within a certain amount of time or the phone would be wiped clean.

Luckily, many of the victims of mobile attacks were relatively safe from harm, as most phones and tablets with Android or iOS automatically back up vital internal data like photos, contacts, notes or texts to cloud services every time the device is plugged in for a charge. Sure, they might have lost a couple songs stored on their SD cards, but other than that, the damage caused by mobile ransomware is significantly less pronounced than what we’ve seen on full-fledged PCs.

The solution…sort of

In this respect, there are two simple solutions to making sure you don’t become a target for ransomware, though it should be noted that one carries considerably more risk than the next.

The first is to simply wait to see if you get infected, and if so, hope that one of the major antivirus vendors have created a fix for your specific type of ransomware. What was once an un-defeatable beast of terrifying magnitude has since been wrangled into a much more manageable threat, and many of the top AV companies have provided fixes that you can download and fit on a USB stick to plug in when the ransom screen appears. With enough time to study the patterns and attack paths of ransomware, malware research groups have found several key tactics to penetrate its armor, which thankfully don’t trigger the self-destruct mechanism in the process.

That said, new types of ransomware (much like the malware it’s based off of), are being developed daily, and it’s nearly impossible for AV companies to account for every different style as they emerges in real time. If you happen to get caught in the web of a new ransomware, your chances of getting your data back unharmed are unfortunately slim to none, unless you give in to the hacker’s demands.

The second method of prevention is much more secure, and in our opinion, the only way to go when it comes to malware.

Back. Up. Everything.

At its core, ransomware exploits people’s unwillingness to back up their most precious data and files onto a separate hard drive that is completely disconnected from their main PC or network. By not creating separate carbon copies of their photo albums, music, programs, or documents, this type of malware can hold these folders hostage, and expect you to pay because it’s the only version you have in existence.

By backing up your operating system and all its contents to an air-gapped external hard drive every single day, you completely mitigate the risk of ransomware by circumventing the tool it uses to get you to pay up in the first place.

Imagine if a real live hacker came into your house at night, stole your computer, and then called you in the morning with demands to “pay up, or the PC gets it.” Little do they know, you had another identical computer waiting for just such an emergency in your closet. You could tell them to keep what they took, and just pull out the new tower and go about enjoying the rest of your day.

That’s the level of security from ransomware you can have as long as you remember to backup all of your data once a day, every day, and be sure to disconnect the drive when you’re done.

Alternatively, you can use a cloud storage solution or backup service to provide the same level of protection. This too will prevent you from becoming a victim of ransomware, and it’s often easier than backing up to a hard drive every day or week. On the downside, such services are much more expensive over time than a hard drive, so you pay for their convenience.

Conclusion

When ransomware first hit, it sent a shockwave through the security industry and claimed tens of thousands of computers as a result.

Since then, we’ve adapted. We’ve studied the tactics of the hackers, and maneuvered through their nonsense to create a system of users and protectors that are ready for whatever the underworld might have to throw our way.

Ransomware is still a problem, sure. Yes, it still claims tens of thousands of PCs, laptops, and mobile devices per year, but it’s not anywhere near the threat that it used to be, and its overall impact grows smaller by the day.

As long as you’re prepared, you can stay one step ahead of ransomware, and simply shake it off like a bad cold if it ever shows up on your doorstep uninvited.

So, you’ve chosen to go with a satellite television provider. Check out our quick rundown of what both Dish Network and DirecTV offer in terms of content, hardware, and pricing, and why you might choose them over streaming services.

What can 360° video do for your car? In the case of the new Waylens Secure360 dash camera, it watches for intruders and attempts to provide a complete picture of both the interior and exterior of your ride.

Researchers discovered a security flaw affecting versions of MacOS prior to 10.13.6 that allows hackers to take control of a Mac during first-time setup and device provisioning. Malicious code can then be injected into the Mac.

To reach its rumored launch timeline of later this year for its low-cost notebook, Apple is expected to begin production of its updated MacBook Air soon. The sub-$1,000 laptop could launch as early as September or October.

A team of Chinese researchers revealed this week that they were able to use a cracked Amazon Echo to exploit a series of Alexa interface flaws to take control over an unteuched Echo running on the same network.

Researchers have successfully hacked John McAfee's Bitfi cryptocurrency wallet. Researchers show that the device can be hacked, as they have gained access to the device's private keys and passphrase despite McAfee's security promotion.

Which music streaming platform is best for you? We pit Spotify versus Pandora, two mighty streaming services with on-demand music and massive catalogs, comparing every facet of the two services to help you decide which is best.

The best laptop should be one that checks all the boxes: Great battery life, beautiful design, and top-notch performance. The laptops we've chosen for our best laptops you can buy do all that — and throw in some extra features while…

A recent survey questioned 595 VR and AR professionals about business growth in the consumer and enterprise markets. Only 24 percent report strong sales in the enterprise while 18 percent show strong sales in the consumer market.

We've compiled a list of the best Chromebooks -- laptops that combine great battery life, comfortable keyboards, and the performance it takes to run Google's lightweight Chrome OS. From Samsung to Acer, these are the Chromebooks that really…

Gamers will have something exciting to look forward to next week when Gamescom starts. Nvidia posted a teaser video to YouTube containing hints that it could use the venue to announce the new GeForce RTX 2080 graphics chip.

Nvidia revealed its new graphics chip design called “Turing” during SIGGRAPH 2018. Rumored to be the foundation of Nvidia’s next family of GeForce cards, the company instead showcased Turing in Quadro RTX-branded cards for pros.